Internet of Things
![Europol](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110453/europol-400x200.jpg)
Europol terrorism investigations data found exposed online
700 pages of confidential dossiers, which included details about terrorism investigations in Europe, have been found exposed on the Internet by the reporters of Dutch TV …
![data](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111125/data-400x200.jpeg)
Tips for businesses to avoid being the next big headline
Data integrity breaches are set to send shockwaves throughout the world in 2017, with at least one almighty breach disclosure of this type expected next year, according to …
![Business ideas](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195343/compliance-400x200.jpg)
Five step approach to address data breaches, increase online trust
The Internet Society has released the findings from its 2016 Global Internet Report in which 59 percent of users admit they would likely not do business with a company which …
![smart hospitals, healthcare](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105723/smart-hospitals-400x200.jpg)
Protecting smart hospitals: A few recommendations
The European Union Agency for Network and Information Security (ENISA) has released a new report to help IT and security officers of healthcare organizations implement IoT …
![Businessman juggling](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195417/problems-400x200.jpg)
Business strategy and innovation framework for the industrial IoT
The Industrial Internet Consortium (IIC), the global, member-supported organization that promotes the accelerated growth of the Industrial Internet of Things (IIoT), announced …
![skull](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09112155/skull-400x200.jpg)
While consumers remain complacent, hackers refine their skills
A new Norton Cyber Security Insights Report found that consumers who were victims of cybercrime within the past year often continued their unsafe behavior. For example, while …
![matrix](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105810/matrix-400x200.jpg)
Analyzing the latest wave of mega attacks
A new report, using data gathered from the Akamai Intelligent Platform, provides analysis of the current cloud security and threat landscape, including insight into two …
![Hands](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194424/hands-keyboard-400x200.jpg)
How hackers will exploit the Internet of Things in 2017
The Internet of Things (IoT) is now a major force in the weaponization of DDoS. In 2016, IoT botnets have fueled a number of attacks, including the largest-ever DDoS attack, …
![brain](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110848/brain-hack-400x200.jpg)
Consumer and business perspectives on IoT, augmented reality risks
As every business becomes a digital business, the spread of technology such as augmented reality (AR) and Internet of Things (IoT) devices can add significant business value …
![cables](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112246/cables-400x200.jpg)
Number of vulnerable enterprises at five year record high
Enterprises across the globe are refreshing their network equipment earlier in its lifecycle in a move to embrace workplace mobility, Internet of Things, and software-defined …
![general virtual digital](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113219/general-virtual-400x200.jpg)
Half of EMEA CIOs participating in a digital ecosystem
CIOs in Europe, the Middle East and Africa (EMEA) are clearly engaging with the era of digital business, with 50 percent participating in a digital ecosystem and 65 percent …
![IoT](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110724/iot-400x200.jpg)
Apocalypse now: The IoT DDoS threat
One of the things you learn about humanity, if you’re paying attention, is that “gold rushes” bring out the worse in us. When there are no constraints and there is a greed …
Featured news
Sponsored
Don't miss
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints